Apparatus and method for protecting data recorded on a storage medium
First Claim
1. A method of protecting protected data recorded on a data storage medium, comprising the steps of:
- (a) in a configuration mode;
(i) dividing a single physical storage device into a protected data space, a virtual data space and an unprotected data space. (b) in an installation mode;
(i) presenting the protected and unprotected data space as two separate physical devices. (ii) concealing the existence of virtual data space. (iii) recording the protected data in the protected data space. (c) in a protect mode;
(i) present the virtual and unprotected data space as two separate physical devices. (ii) concealing the existence of protected data space. (iii) receiving a read data request from a processor and responding to the read data request by;
(1) if the requested read data is recorded in the virtual data space, reading the requested read data from the virtual data space and transmitting the read data to the processor;
(2) if the requested read data is not recorded in the virtual data space, reading the requested read data from the real data space and transmitting the read data to the processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A controller for protecting data on a data storage medium is disclosed. A single physical data storage device is divided into a protected data space, a virtual data space and an unprotected data space in an installation mode. Subsequently, the protected and unprotected data space are presented as two separate physical data storage devices and the existence of virtual data space is concealed. The two data storage devices are respectively represented as having capacity equal to that of the protected and unprotected data space only. A set of protected data (which may include software and data) is initially installed in the protected data space. During use, data transmitted to the controller for recording in the data storage space is recorded only in the virtual data space. Data may be read from either the protected data space or the virtual data space, depending on whether the virtual data space contains newer data. In one embodiment, the contents of the virtual data space are discarded at the beginning of each session of the computing system in which the controller is installed. In another embodiment, the virtual data space is discarded only when the controller is instructed to do so and the contents of the virtual data space may be made permanent by copying them to the protected data space. The protected data space and virtual data space may be located on different data storage devices. The controller may also receive read data and write data requests for an unprotected data space, which may be used to record data permanently, independent of the protected and virtual data spaces.
-
Citations
15 Claims
-
1. A method of protecting protected data recorded on a data storage medium, comprising the steps of:
-
(a) in a configuration mode;
(i) dividing a single physical storage device into a protected data space, a virtual data space and an unprotected data space. (b) in an installation mode;
(i) presenting the protected and unprotected data space as two separate physical devices. (ii) concealing the existence of virtual data space. (iii) recording the protected data in the protected data space. (c) in a protect mode;
(i) present the virtual and unprotected data space as two separate physical devices. (ii) concealing the existence of protected data space. (iii) receiving a read data request from a processor and responding to the read data request by;
(1) if the requested read data is recorded in the virtual data space, reading the requested read data from the virtual data space and transmitting the read data to the processor;
(2) if the requested read data is not recorded in the virtual data space, reading the requested read data from the real data space and transmitting the read data to the processor. - View Dependent Claims (2, 3)
-
-
4. A method of protecting protected data recorded on a data storage medium, comprising the steps of:
-
(a) in a configuration mode, dividing the data storage medium into at least a protected data space and a virtual data space;
(b) in an installation mode, recording the protected data in the protected data space;
(c) in a protect mode, receiving a read data request from a processor and responding to the read data request by;
(i) if the requested read data is recorded in the virtual data space, reading the requested read data from the virtual data space and transmitting the read data to the processor;
(ii) if the requested read data is not recorded in the virtual data space, reading the requested read data from the protected data space and transmitting the read data to the processor. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A method of protecting protected data comprising:
-
(a) providing a protected data space having a plurality of virtual protected blocks;
(b) providing a virtual data space having a plurality of virtual blocks for recording virtual data, wherein each of the protected blocks corresponds to one of the virtual blocks;
(c) recording said protected data in one or more of said protected blocks;
(d) identifying each of said virtual blocks as not containing valid virtual data;
(d) processing read data requests from a processor by;
(i) determining one or more specific protected blocks in which the read data may be recorded;
(ii) determining one or more specific virtual blocks which correspond to the one or more specific protected blocks;
(ii) determining whether the one or more specific virtual blocks contain valid virtual data;
(iii) if the one or more specific virtual blocks contain valid virtual data, then reading the requested read data from the one or more specific virtual blocks and transmitting it to the processor, (iv) if the one or more specific virtual blocks does not contain valid virtual data, then reading the requested read data from the one or more specific protected blocks and transmitting it to the processor;
(e) processing write data requests from the processor by;
(i) selecting one or more virtual blocks;
(ii) recording the write data in the one or more selected virtual blocks;
(iii) identifying the one or more selected virtual blocks as containing valid virtual data. - View Dependent Claims (12, 13, 14, 15)
-
Specification